Advisory
A note with CVSS 6.5 for component EP-PIN-PRT was released by SAP on 11.04.2023. The correction/advisory 3289994 was described with "[CVE-2023-28761] Missing Authentication check in SAP NetWeaver Enterprise Portal" and affects the system type Java.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is missing authentication check within Java.
Risk specification
In SAP NetWeaver Enterprise Portal, an unauthenticated attacker can attach to an open interface and make use of an open API to access a service that will enable them to access or modify server settings and data, leading to a limited impact on confidentiality and integrity.Solution
The affected code has been updated to restrict access to the service in SAP NetWeaver Enterprise Portal.
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- 10.0 [CVE-2020-6207] Missing Authentication Check in SAP Solution Manager (User-Experience Monitoring)
- 10.0 [CVE-2020-26829] Missing Authentication Check in SAP NetWeaver AS JAVA (P2P Cluster Communication)
- 9.9 [CVE-2023-23857] Improper Access Control in SAP NetWeaver AS for Java
- 9.8 [CVE-2020-6198] Missing Authentication check in SAP Solution Manager (Diagnostics Agent)
- 9.8 [CVE-2024-41730] Missing Authentication check in SAP BusinessObjects Business Intelligence Platform